{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T09:15:13Z","timestamp":1762506913078,"version":"3.37.3"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2016,9,27]],"date-time":"2016-09-27T00:00:00Z","timestamp":1474934400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"crossref","award":["2015B30614"],"award-info":[{"award-number":["2015B30614"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100004608","name":"Natural Science Foundation of Jiangsu Province","doi-asserted-by":"publisher","award":["BK20160287"],"award-info":[{"award-number":["BK20160287"]}],"id":[{"id":"10.13039\/501100004608","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["NRF-2015R1C1A1A01053301"],"award-info":[{"award-number":["NRF-2015R1C1A1A01053301"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1186\/s13638-016-0732-z","type":"journal-article","created":{"date-parts":[[2016,9,27]],"date-time":"2016-09-27T12:06:44Z","timestamp":1474978004000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":55,"title":["Interference cancellation for non-orthogonal multiple access used in future wireless mobile networks"],"prefix":"10.1186","volume":"2016","author":[{"given":"Xin","family":"Su","sequence":"first","affiliation":[]},{"given":"HaiFeng","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Wansoo","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Chang","family":"Choi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1535-646X","authenticated-orcid":false,"given":"Dongmin","family":"Choi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,27]]},"reference":[{"key":"732_CR1","unstructured":"K Maxim, C Andrey, P Anton, K Igor, Technique of data visualization: example of network topology display for security monitoring. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA) 7(1), 79\u201396 (2016)"},{"key":"732_CR2","unstructured":"B Bharat, AM Johnson, M Gisele Izera, A Pelin, A systematic approach for attack analysis and mitigation in V2V networks. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA) 7(1), 97\u2013117 (2016)"},{"key":"732_CR3","unstructured":"U Kim, J Kim, Research on object-oriented relational database model and its utilization for dynamic geo-spatial service through next generation ship navigation system, IT Convergence Practice 1(2), 1\u201310 (2013)"},{"key":"732_CR4","doi-asserted-by":"publisher","unstructured":"Y. Saito, Y. Kishiyama, A. Benjebbour, T. Nakamura, A. Li, and K. Higuchi, Non-orthogonal multiple access (NOMA) for cellular future radio access, in Proc. of IEEE VTC-Spring, 2013, pp. 1-5.","DOI":"10.1109\/VTCSpring.2013.6692652"},{"key":"732_CR5","doi-asserted-by":"crossref","unstructured":"Umehara, and Y. Kishiyama, Enhancing user fairness in non-orthogonalaccess with successive interference cancellation for cellular downlink, in Proc. of IEEE ICCS, 2012, 324-328","DOI":"10.1109\/ICCS.2012.6406163"},{"key":"732_CR6","unstructured":"K. Beomju, Non-orthogonal multiple access in a downlink multiuser beamforming system, in Proc. of IEEE MILCOM, 2013, 1278-1283."},{"key":"732_CR7","doi-asserted-by":"publisher","unstructured":"A. Benjebbour, System-level performance of downlink\u00a0NOMA\u00a0for future LTE enhancements,\u00a0in Proc. of IEEE GC Workshop, 2013, 66-70","DOI":"10.1109\/GLOCOMW.2013.6824963"},{"issue":"9","key":"732_CR8","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1109\/MCOM.2015.7263349","volume":"53","author":"L Dai","year":"2015","unstructured":"L Dai, B Wang, Y Yuan, S Han, I Chih-Lin, Z Wang, Non-orthogonal multiple access for 5G: solutions, challenges, opportunities, and future research trends. IEEE Communications Magzine 53(9), 74\u201381 (2015)","journal-title":"IEEE Communications Magzine"},{"key":"732_CR9","doi-asserted-by":"publisher","unstructured":"B. Wang, K. Wang, Z. Lu, T. Xie, and J. Quan, Comparison study of non-orthogonal multiple access schemes for 5G, in Proc. IEEE International Symposium on BMSB, 2015, 1-5","DOI":"10.1109\/BMSB.2015.7177186"},{"issue":"2","key":"732_CR10","first-page":"1","volume":"6","author":"A Kitana","year":"2016","unstructured":"A Kitana, I Traore, I Woungang, Impact study of a mobile botnet over LTE networks. J Internet Serv Info Sec 6(2), 1\u201322 (2016)","journal-title":"J Internet Serv Info Sec"},{"key":"732_CR11","doi-asserted-by":"crossref","unstructured":"N. Otao, Y. Kishiyama, and K. Higuchi, Performance of nonorthogonal access with SIC in cellular downlink using proportional fairbased resource allocation, in Proc. of IEEE ISWCS, 2012, 476-480","DOI":"10.1109\/ISWCS.2012.6328413"},{"key":"732_CR12","unstructured":"Q. Liu, B. Hui, and K.H. Chang, A survey on non-orthogonal multiple access schemes, in Proc. of KICS Winter Conf., 2014, 98-101."},{"key":"732_CR13","doi-asserted-by":"publisher","unstructured":"A. Benjebbour, A. Li, Y. Saito, Y. Kishiyama, A. Harada, and T. Nakamura, System-level performance of downlink NOMA for future LTE enhancements, in Proc. of IEEE Globecom, 2013, 66-70","DOI":"10.1109\/GLOCOMW.2013.6824963"},{"key":"732_CR14","doi-asserted-by":"crossref","unstructured":"Saito, A. Benjebbour, Y. Kishiyama, and T. Nakamura, System-level performance of downlink non-orthogonal multiple access (noma) under various environments, in Proc. of IEEE VTC, 2015, 1-5","DOI":"10.1109\/VTCSpring.2015.7146120"},{"key":"732_CR15","doi-asserted-by":"publisher","unstructured":"T. Seyama and H. Seki, Efficient selection of user sets for downlink non-orthogonal multiple access, in Proc. of IEEE PIMRC, 2015, 1062-1066","DOI":"10.1109\/PIMRC.2015.7343455"},{"key":"732_CR16","doi-asserted-by":"publisher","unstructured":"M.R. Hojeij, J. Farah, C.A. Nour, and C. Douillard, Resource allocation in downlink non-orthogonal multiple access (NOMA) for future radio access. in Proc. of IEEE VTC-Spring, 2015, 1-6","DOI":"10.1109\/VTCSpring.2015.7146056"},{"issue":"2","key":"732_CR17","first-page":"20","volume":"1","author":"X Liu","year":"2013","unstructured":"X Liu, H Miao, X Huang, A novel approach for blind estimation of a MIMO channel including phase unwrapping ambiguity elimination. IT Convergence Practice 1(2), 20\u201333 (2013)","journal-title":"IT Convergence Practice"},{"issue":"1","key":"732_CR18","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/TIT.1972.1054727","volume":"18","author":"TM Cover","year":"1972","unstructured":"TM Cover, Broadcast channels. IEEE Trans. Inf. Theory 18(1), 2\u201314 (1972)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"2","key":"732_CR19","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1109\/TIT.1974.1055184","volume":"20","author":"PP Bergmans","year":"1974","unstructured":"PP Bergmans, A simple converse for broadcast channels with additive white Gaussian noise. IEEE Trans. Inf. Theory 20(2), 279\u2013280 (1974)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"732_CR20","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/978-1-4615-2694-0_14","volume-title":"Communications and Cryptography: Two Sides of One Tapestry","author":"RG Gallager","year":"1994","unstructured":"RG Gallager, An inequality on the capacity region of multiaccess multipath channels, in Communications and Cryptography: Two Sides of One Tapestry (Kluwer, Boston, 1994), pp. 129\u2013139"},{"key":"732_CR21","doi-asserted-by":"publisher","unstructured":"D. Tse and P. Viswanath, Fundamentals of wireless communication. Cambridge, Cambridge Univ. Press, 2005, ch. 6.","DOI":"10.1017\/CBO9780511807213"},{"issue":"3","key":"732_CR22","doi-asserted-by":"publisher","first-page":"791","DOI":"10.1109\/TCOMM.2015.2394393","volume":"63","author":"J Choi","year":"2015","unstructured":"J Choi, Minimum power multicast beamforming with superposition coding for multiresolution broadcast and application to NOMA systems. IEEE Trans. Commun. 63(3), 791\u2013800 (2015)","journal-title":"IEEE Trans. Commun."},{"issue":"1","key":"732_CR23","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1109\/TSP.2015.2480042","volume":"64","author":"MF Hanif","year":"2006","unstructured":"MF Hanif, Z Ding, T Ratnarajah, GK Karagiannidis, A minorization-maximization method for optimizing sum rate in nonorthogonal multiple access systems. IEEE Trans. Signal Process 64(1), 76\u201388 (2006)","journal-title":"IEEE Trans. Signal Process"},{"issue":"4","key":"732_CR24","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1109\/LWC.2015.2426709","volume":"4","author":"Q Sun","year":"2015","unstructured":"Q Sun, S Han, I C-L, Z Pan, On the ergodic capacity of MIMO NOMA systems. IEEE Wireless Commun. Lett. 4(4), 405\u2013408 (2015)","journal-title":"IEEE Wireless Commun. Lett."},{"issue":"1","key":"732_CR25","doi-asserted-by":"publisher","first-page":"537","DOI":"10.1109\/TWC.2015.2475746","volume":"15","author":"Z Ding","year":"2016","unstructured":"Z Ding, F Adachi, HV Poor, The application of MIMO to nonorthogonal multiple access. IEEE Trans. Wireless Commun. 15(1), 537\u2013552 (2016)","journal-title":"IEEE Trans. Wireless Commun."}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-016-0732-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13638-016-0732-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-016-0732-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,17]],"date-time":"2020-05-17T06:17:49Z","timestamp":1589696269000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-016-0732-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9,27]]},"references-count":25,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,12]]}},"alternative-id":["732"],"URL":"https:\/\/doi.org\/10.1186\/s13638-016-0732-z","relation":{},"ISSN":["1687-1499"],"issn-type":[{"type":"electronic","value":"1687-1499"}],"subject":[],"published":{"date-parts":[[2016,9,27]]},"article-number":"231"}}